{"title":"基于插值多项式方法的物理层认证机制","authors":"Yong-Bing Zhang, Liang Jin, Qiang Han","doi":"10.1109/IEEECONF52377.2022.10013332","DOIUrl":null,"url":null,"abstract":"Most of the existing physical layer challenge-response authentication methods assume that the attacker does not have access to the channel information of both legitimate parties. Their security relies on the privacy of the wireless channel strongly. However, in the actual communication environment, the above assumption is difficult to guarantee that if the attacking party obtains the legitimate channel information, it can directly crack the key based on the authentication response. To address these problems, this paper proposes a physical layer authentication mechanism based on the interpolated polynomial method using polynomial interpolation. First, the authentication parties extract the wireless channel characteristics and combine them with the shared key to obtain the joint key. Then both parties use the same key pair to construct their respective curve equations by Newton interpolation polynomial. Subsequently, the sender randomly selects the data not in the joint key to substitute into the equation to construct the authentication vector and send it to the authenticating party. Finally, the authenticating party sets the authentication threshold according to the requirements and calculates the matching result based on the data in the authentication vector for judgment. The simulation results show that the method has great security and authentication success rate.","PeriodicalId":193681,"journal":{"name":"2021 International Conference on Advanced Computing and Endogenous Security","volume":" 3","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Physical Layer Authentication Mechanism Based on Interpolated Polynomial Method\",\"authors\":\"Yong-Bing Zhang, Liang Jin, Qiang Han\",\"doi\":\"10.1109/IEEECONF52377.2022.10013332\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Most of the existing physical layer challenge-response authentication methods assume that the attacker does not have access to the channel information of both legitimate parties. Their security relies on the privacy of the wireless channel strongly. However, in the actual communication environment, the above assumption is difficult to guarantee that if the attacking party obtains the legitimate channel information, it can directly crack the key based on the authentication response. To address these problems, this paper proposes a physical layer authentication mechanism based on the interpolated polynomial method using polynomial interpolation. First, the authentication parties extract the wireless channel characteristics and combine them with the shared key to obtain the joint key. Then both parties use the same key pair to construct their respective curve equations by Newton interpolation polynomial. Subsequently, the sender randomly selects the data not in the joint key to substitute into the equation to construct the authentication vector and send it to the authenticating party. Finally, the authenticating party sets the authentication threshold according to the requirements and calculates the matching result based on the data in the authentication vector for judgment. The simulation results show that the method has great security and authentication success rate.\",\"PeriodicalId\":193681,\"journal\":{\"name\":\"2021 International Conference on Advanced Computing and Endogenous Security\",\"volume\":\" 3\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-04-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 International Conference on Advanced Computing and Endogenous Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IEEECONF52377.2022.10013332\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Advanced Computing and Endogenous Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IEEECONF52377.2022.10013332","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Physical Layer Authentication Mechanism Based on Interpolated Polynomial Method
Most of the existing physical layer challenge-response authentication methods assume that the attacker does not have access to the channel information of both legitimate parties. Their security relies on the privacy of the wireless channel strongly. However, in the actual communication environment, the above assumption is difficult to guarantee that if the attacking party obtains the legitimate channel information, it can directly crack the key based on the authentication response. To address these problems, this paper proposes a physical layer authentication mechanism based on the interpolated polynomial method using polynomial interpolation. First, the authentication parties extract the wireless channel characteristics and combine them with the shared key to obtain the joint key. Then both parties use the same key pair to construct their respective curve equations by Newton interpolation polynomial. Subsequently, the sender randomly selects the data not in the joint key to substitute into the equation to construct the authentication vector and send it to the authenticating party. Finally, the authenticating party sets the authentication threshold according to the requirements and calculates the matching result based on the data in the authentication vector for judgment. The simulation results show that the method has great security and authentication success rate.